The GI-Media Library plugin for WordPress is vulnerable to Directory Traversal in versions before 3.0 via the 'fileid' parameter. This allows unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information.
Metrics
Affected Vendors & Products
References
History
Mon, 21 Jul 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 19 Jul 2025 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The GI-Media Library plugin for WordPress is vulnerable to Directory Traversal in versions before 3.0 via the 'fileid' parameter. This allows unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information. | |
| Title | GI-Media Library < 3.0 - Directory Traversal | |
| Weaknesses | CWE-22 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published: 2025-07-19T09:23:51.606Z
Updated: 2025-07-21T16:53:44.202Z
Reserved: 2025-07-18T21:19:57.981Z
Link: CVE-2015-10136
Updated: 2025-07-21T16:53:36.564Z
Status : Awaiting Analysis
Published: 2025-07-19T10:15:23.773
Modified: 2025-07-22T13:06:07.260
Link: CVE-2015-10136
No data.